Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Network Troubleshooting, Hardware Troubleshooting, Command-Line Interface, Desktop Support, Operating Systems, Network Administration, System Support, System Configuration, Computer Hardware, Network Security, Microsoft Windows, Technical Support and Services, General Networking, Technical Support, Mac OS, Linux, Mobile Security, Infrastructure Security, Computer Displays, Firewall
University of Michigan
Skills you'll gain: PHP (Scripting Language), MySQL, Database Application, Database Development, Object Oriented Programming (OOP), Application Development, Back-End Web Development, Authentications, Web Applications, SQL, Server Side, Application Security, Model View Controller, Data Validation
- Status: Free
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Business Continuity Planning, Emergency Response, Safety and Security, Public Safety and National Security, Resilience, Emergency Medicine, First Aid, Risk Management, Cultural Diversity
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Skills you'll gain: Authentications, Secure Coding, Cryptography, Application Security, Web Applications, Javascript, Identity and Access Management, Cybersecurity, Node.JS, Front-End Web Development
Skills you'll gain: Virtualization, Unix, IBM DB2, IBM Cloud, Data Management, Virtual Machines, Database Management Systems, Data Storage, Infrastructure Architecture, System Programming, Operating Systems, Unix Commands, IT Infrastructure, File Systems, System Monitoring, Computer Architecture, Servers, Control Panels, Command-Line Interface, Computing Platforms
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
Amazon Web Services
Skills you'll gain: Serverless Computing, Event-Driven Programming, Solution Architecture, Cloud Computing Architecture, Cloud Solutions, Identity and Access Management, Amazon Web Services, API Gateway, Hybrid Cloud Computing, Multi-Tenant Cloud Environments, Information Technology Architecture, Performance Tuning, Amazon DynamoDB, Amazon S3, Cloud Security, AWS Kinesis, Containerization
University at Buffalo
Skills you'll gain: Digital Transformation, Manufacturing Processes, Manufacturing Operations, Industrial Engineering, Business Transformation, Product Design, Digital Design, Data-Driven Decision-Making, Process Improvement and Optimization, Market Dynamics, Safety and Security, Workforce Development
University of Illinois Urbana-Champaign
Skills you'll gain: Investments, Finance, Portfolio Management, Business Valuation, Financial Modeling, Financial Market, Equities, Return On Investment, Financial Analysis, Corporate Finance, Microsoft Excel, Regression Analysis, Risk Analysis, Performance Analysis, Cash Flows
University of California, Davis
Skills you'll gain: Data Storytelling, Data Presentation, Key Performance Indicators (KPIs), Dashboard, Interactive Data Visualization, Tableau Software, Data Visualization Software, Data Visualization, Data-Driven Decision-Making, Storytelling, Performance Metric, Performance Measurement, Performance Analysis, Business Metrics, Statistical Reporting, Customer Analysis, Requirements Analysis, Presentations, Public Speaking
In summary, here are 10 of our most popular breach (security exploit) courses
- Preparation for CompTIA A+ Certification:Â IBM
- Building Database Applications in PHP:Â University of Michigan
- Disaster Preparedness:Â University of Pittsburgh
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- JavaScript Security Refreshers:Â Infosec
- IBM z/OS Mainframe Practitioner:Â IBM
- Kali Linux:Â Board Infinity
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Architecting Solutions on AWS:Â Amazon Web Services
- Digital Manufacturing & Design:Â University at Buffalo